CN1617492A - 提供服务的系统和方法 - Google Patents

提供服务的系统和方法 Download PDF

Info

Publication number
CN1617492A
CN1617492A CNA2004100749295A CN200410074929A CN1617492A CN 1617492 A CN1617492 A CN 1617492A CN A2004100749295 A CNA2004100749295 A CN A2004100749295A CN 200410074929 A CN200410074929 A CN 200410074929A CN 1617492 A CN1617492 A CN 1617492A
Authority
CN
China
Prior art keywords
smart card
key
sensitive data
application program
kcp
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2004100749295A
Other languages
English (en)
Chinese (zh)
Inventor
奥利维尔·翁德特
亨利·吉尔伯特
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Orange SA
Original Assignee
France Telecom SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=34130360&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CN1617492(A) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by France Telecom SA filed Critical France Telecom SA
Publication of CN1617492A publication Critical patent/CN1617492A/zh
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/101Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Computing Systems (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Databases & Information Systems (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Communication Control (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Telephonic Communication Services (AREA)
CNA2004100749295A 2003-09-03 2004-09-01 提供服务的系统和方法 Pending CN1617492A (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP03292168A EP1513113B2 (fr) 2003-09-03 2003-09-03 Système et procédé pour la communication sécurisée basé sur cartes à puce
EP03292168.6 2003-09-03

Publications (1)

Publication Number Publication Date
CN1617492A true CN1617492A (zh) 2005-05-18

Family

ID=34130360

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2004100749295A Pending CN1617492A (zh) 2003-09-03 2004-09-01 提供服务的系统和方法

Country Status (7)

Country Link
US (1) US7587599B2 (fr)
EP (1) EP1513113B2 (fr)
JP (1) JP2005080315A (fr)
CN (1) CN1617492A (fr)
AT (1) ATE332549T1 (fr)
DE (1) DE60306648T2 (fr)
ES (1) ES2268296T3 (fr)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101403985B (zh) * 2008-05-04 2011-03-30 北京深思洛克软件技术股份有限公司 一种对软件保护装置中的软件许可进行备份的方法
CN104009977A (zh) * 2014-05-09 2014-08-27 北京奇虎科技有限公司 一种信息保护的方法和系统
CN105245526A (zh) * 2015-10-19 2016-01-13 中国联合网络通信集团有限公司 调用sim卡应用的方法与装置
CN102752750B (zh) * 2005-12-30 2016-08-03 英特尔公司 使用基于可信平台的共享秘密推导和基于wwan基础设施的登记来建立本地安全信道
CN110378097A (zh) * 2014-09-26 2019-10-25 英特尔公司 保障传感器数据安全
CN110378097B (zh) * 2014-09-26 2024-06-04 英特尔公司 保障传感器数据安全

Families Citing this family (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080075756A1 (en) * 2004-06-30 2008-03-27 Advanced Medical Optics, Inc. Enhancement of lens regeneration using materials comprising polymers
KR101180612B1 (ko) * 2004-11-08 2012-09-06 소니 주식회사 정보 처리 시스템 및 정보 처리 장치
JP4781692B2 (ja) * 2005-03-08 2011-09-28 インターナショナル・ビジネス・マシーンズ・コーポレーション クライアントのi/oアクセスを制限する方法、プログラム、システム
KR100947213B1 (ko) * 2005-04-06 2010-03-11 브로드콤 코포레이션 멀티미디어 프로세서 내의 보안 조건부 액세스 및 디지털권한 관리 기법
JP2008535427A (ja) * 2005-04-07 2008-08-28 フランス テレコム データ処理デバイスとセキュリティモジュールとの間のセキュア通信
JP2009512928A (ja) * 2005-10-21 2009-03-26 ノキア コーポレイション 移動体端末のセキュア認証レスポンスの装置、コンピュータプログラムプロダクト及び方法
US7747861B2 (en) * 2005-11-09 2010-06-29 Cisco Technology, Inc. Method and system for redundant secure storage of sensitive data by using multiple keys
CN101292463B (zh) * 2005-12-26 2011-02-16 三菱电机株式会社 内容分配系统和终端以及服务器
US7639237B2 (en) * 2006-03-03 2009-12-29 Perkins Michael T Roll-out touch screen support system (ROTS3)
US7464865B2 (en) * 2006-04-28 2008-12-16 Research In Motion Limited System and method for managing multiple smart card sessions
WO2007148768A1 (fr) * 2006-06-23 2007-12-27 Semiconductor Energy Laboratory Co., Ltd. Système de gestion de données personnelles et carte mémoire non volatile
JP5137474B2 (ja) * 2006-06-23 2013-02-06 株式会社半導体エネルギー研究所 個人情報管理システム及び管理システム
EP2450822B1 (fr) 2006-07-19 2014-03-12 BlackBerry Limited Procédé, système et lecteur de carte intelligente pour la gestion d'un accès à une carte intelligente
US7766243B2 (en) * 2006-07-19 2010-08-03 Research In Motion Limited Method, system and smart card reader for management of access to a smart card
US20090249492A1 (en) * 2006-09-21 2009-10-01 Hans Martin Boesgaard Sorensen Fabrication of computer executable program files from source code
WO2008034900A1 (fr) * 2006-09-21 2008-03-27 Boesgaard Soerensen Hans Marti Fabrication de fichiers de programme exécutables par ordinateur à partir d'un code source
US8468351B2 (en) 2006-12-15 2013-06-18 Codesealer Aps Digital data authentication
US8280978B2 (en) 2006-12-29 2012-10-02 Prodea Systems, Inc. Demarcation between service provider and user in multi-services gateway device at user premises
US11316688B2 (en) 2006-12-29 2022-04-26 Kip Prod P1 Lp Multi-services application gateway and system employing the same
US9569587B2 (en) 2006-12-29 2017-02-14 Kip Prod Pi Lp Multi-services application gateway and system employing the same
US20230057851A1 (en) * 2006-12-29 2023-02-23 Kip Prod P1 Lp Display inserts, overlays, and graphical user interfaces for multimedia systems
US20170344703A1 (en) 2006-12-29 2017-11-30 Kip Prod P1 Lp Multi-services application gateway and system employing the same
US11783925B2 (en) 2006-12-29 2023-10-10 Kip Prod P1 Lp Multi-services application gateway and system employing the same
US9602880B2 (en) * 2006-12-29 2017-03-21 Kip Prod P1 Lp Display inserts, overlays, and graphical user interfaces for multimedia systems
US8547957B2 (en) * 2007-07-23 2013-10-01 Savi Technology, Inc. Method and apparatus for providing security in a radio frequency identification system
US20090126027A1 (en) * 2007-11-08 2009-05-14 Rambus, Inc. File accessing and retrieval using soft digital rights management technology
US20090177884A1 (en) * 2008-01-04 2009-07-09 Benica Corporation Digital content security system, portable steering device and method of securing digital contents
DE102008000067C5 (de) * 2008-01-16 2012-10-25 Bundesdruckerei Gmbh Verfahren zum Lesen von Attributen aus einem ID-Token
US8495213B2 (en) * 2008-04-10 2013-07-23 Lg Electronics Inc. Terminal and method for managing secure devices
US20090260071A1 (en) * 2008-04-14 2009-10-15 Microsoft Corporation Smart module provisioning of local network devices
EP2113856A1 (fr) * 2008-04-29 2009-11-04 Tiny Industries ApS Stockage sécurisé de données utilisateur dans des dispositifs adaptés aux UICC et Smart Card
GB0811897D0 (en) * 2008-06-30 2008-07-30 Steed Darren Intelligent file encapsulation
JP5449905B2 (ja) * 2009-07-29 2014-03-19 フェリカネットワークス株式会社 情報処理装置、プログラム、および情報処理システム
DE102010013201A1 (de) * 2010-03-29 2011-09-29 Giesecke & Devrient Gmbh Verfahren zum Zuordnen einer ersten Datenträgereinheit zu einer zweiten Datenträgereinheit
US8713314B2 (en) 2011-08-30 2014-04-29 Comcast Cable Communications, Llc Reoccuring keying system
US9215591B2 (en) 2012-12-06 2015-12-15 At&T Intellectual Property I, L.P. Security for network load broadcasts over cellular networks
JP6393988B2 (ja) * 2013-02-28 2018-09-26 株式会社リコー 機器、情報処理システム、制御方法、プログラム、および記憶媒体
US9396355B2 (en) 2013-12-17 2016-07-19 International Business Machines Corporation Multi-part encrypted messages for support of sensitive systems
US9264899B2 (en) * 2013-12-19 2016-02-16 Nxp, B.V. Binding mobile device secure software components to the SIM
US9910655B1 (en) * 2014-11-06 2018-03-06 Accellion, Inc. Secure content platform software developer kit
WO2016112338A1 (fr) * 2015-01-08 2016-07-14 Intertrust Technologies Corporation Systèmes et procédés cryptographiques
CN104980580B (zh) * 2015-06-17 2018-03-23 小米科技有限责任公司 短信息查看方法及装置
EP3282738A1 (fr) * 2016-08-11 2018-02-14 Gemalto Sa Procédé de liaison d'une application de terminal à un élément de sécurité et élément de protection correspondant, application de terminal et serveur

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5221838A (en) * 1990-12-24 1993-06-22 Motorola, Inc. Electronic wallet
DE4119924C3 (de) * 1991-06-17 1996-06-20 Siemens Ag Verfahren zur Sicherung von ladbaren Guthaben in Chipkarten
FR2718312B1 (fr) * 1994-03-29 1996-06-07 Rola Nevoux Procédé d'authentification combinée d'un terminal de télécommunication et d'un module d'utilisateur.
EP0936812A1 (fr) * 1998-02-13 1999-08-18 CANAL+ Société Anonyme Procédé et appareil d'enregistrement de données numériques cryptées
FR2794595B1 (fr) * 1999-06-03 2002-03-15 Gemplus Card Int Pre-controle d'un programme dans une carte a puce additionnelle d'un terminal
JP2000347566A (ja) * 1999-06-08 2000-12-15 Mitsubishi Electric Corp コンテンツ管理装置、コンテンツ利用者端末及びプログラムを記録したコンピュータ読み取り可能な記録媒体
WO2001041356A1 (fr) * 1999-12-02 2001-06-07 Sanyo Electric Co., Ltd. Carte memoire et systeme de distribution de donnees faisant intervenir une telle carte
US20010045451A1 (en) * 2000-02-28 2001-11-29 Tan Warren Yung-Hang Method and system for token-based authentication
US20030009681A1 (en) * 2001-07-09 2003-01-09 Shunji Harada Digital work protection system, recording medium apparatus, transmission apparatus, and playback apparatus
JP4243932B2 (ja) * 2001-07-09 2009-03-25 パナソニック株式会社 コンテンツ管理システムおよび情報記録媒体
CN1311456C (zh) * 2001-07-19 2007-04-18 皇家菲利浦电子有限公司 用于再生用户数据的设备和方法
JP3933003B2 (ja) * 2002-07-30 2007-06-20 株式会社日立製作所 Icカードおよび決済端末

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102752750B (zh) * 2005-12-30 2016-08-03 英特尔公司 使用基于可信平台的共享秘密推导和基于wwan基础设施的登记来建立本地安全信道
CN101403985B (zh) * 2008-05-04 2011-03-30 北京深思洛克软件技术股份有限公司 一种对软件保护装置中的软件许可进行备份的方法
CN104009977A (zh) * 2014-05-09 2014-08-27 北京奇虎科技有限公司 一种信息保护的方法和系统
WO2015169158A1 (fr) * 2014-05-09 2015-11-12 北京奇虎科技有限公司 Procédé et système de protection d'informations
CN104009977B (zh) * 2014-05-09 2016-10-05 北京奇虎科技有限公司 一种信息保护的方法和系统
CN110378097A (zh) * 2014-09-26 2019-10-25 英特尔公司 保障传感器数据安全
CN110378097B (zh) * 2014-09-26 2024-06-04 英特尔公司 保障传感器数据安全
CN105245526A (zh) * 2015-10-19 2016-01-13 中国联合网络通信集团有限公司 调用sim卡应用的方法与装置
CN105245526B (zh) * 2015-10-19 2018-06-19 中国联合网络通信集团有限公司 调用sim卡应用的方法与装置

Also Published As

Publication number Publication date
US7587599B2 (en) 2009-09-08
ATE332549T1 (de) 2006-07-15
ES2268296T3 (es) 2007-03-16
EP1513113B1 (fr) 2006-07-05
JP2005080315A (ja) 2005-03-24
DE60306648D1 (de) 2006-08-17
DE60306648T2 (de) 2007-06-21
EP1513113B2 (fr) 2011-02-23
US20050086479A1 (en) 2005-04-21
EP1513113A1 (fr) 2005-03-09

Similar Documents

Publication Publication Date Title
CN1617492A (zh) 提供服务的系统和方法
CN1592307A (zh) 用于分发数据的系统和方法
CN100343844C (zh) 数据配送装置和数据配送用的终端装置
EP2063675B1 (fr) Gestion de droits numériques (DRM) robuste et flexible à module d'identité inviolable
US20040101141A1 (en) System and method for securely installing a cryptographic system on a secure device
CN1879102A (zh) 在便携式存储器和装置之间重放基于数字版权管理的内容的方法和设备及其便携式存储器
CN1728038A (zh) 提供权限数据对象的方法
CN1977490A (zh) 存储媒体处理方法、存储媒体处理装置以及程序
CN1269549A (zh) 操纵计算机文件和/或程序的系统和方法
CN1930818A (zh) 改进的域管理器和域设备
CN1640178A (zh) 服务器设备、通信装置以及用于限制内容使用的程序
US20070183598A1 (en) Apparatus for managing DRM installation and method thereof
CN101807234A (zh) 在存储卡中安装内容的权限对象的方法
CN1610295A (zh) 使用便携式存储装置用于管理数字权限的方法和设备
CN101140610A (zh) 使用drm卡的内容解密方法
CN112954000A (zh) 一种基于区块链和ipfs技术的隐私信息管理方法及系统
CN101065942A (zh) 用于从第一终端单元向第二终端单元迁移特定加密访问对象的方法和设备
US20110154436A1 (en) Provider Management Methods and Systems for a Portable Device Running Android Platform
CN101057447A (zh) 用于从服务器向移动终端设备重新分发特定编码访问对象的方法和设备
CN110807210B (zh) 一种信息处理方法、平台、系统及计算机存储介质
CN1851606A (zh) 一种版权信息处理方法及系统
CN111523128B (zh) 信息保护方法、系统、电子设备及介质
CN1961306A (zh) 发送和接收转换格式的数字版权对象的设备和方法
KR20050104182A (ko) Drm 컨텐츠 서비스 사용자 인증 방법
CN111641941A (zh) 一种移动终端软件的安全下载方法及系统

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned

Effective date of abandoning: 20050518

C20 Patent right or utility model deemed to be abandoned or is abandoned